Efficiency Analysis of Cryptographic Algorithms for Image Data Security at Cloud Environment

被引:4
|
作者
Rahul, B. [1 ]
Kuppusamy, K. [1 ]
机构
[1] Alagappa Univ, Dept Comp Sci, Karaikkudi 630003, Tamil Nadu, India
关键词
Cloud computing; cloud security; cryptography; image encryption; image storing; security algorithms analysis; DES;
D O I
10.1080/03772063.2021.1990141
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud computing uses a network of remote servers hosted on the Internet to store, manage, and process data. As the cloud is explicitly unsafe, from the time the cloud platform was utilized for storage many researchers and analysts have been trying to develop many encryption algorithms to provide excellent security on the data. The algorithms' weaknesses, performance and strength should be known to apply a suitable cryptography algorithm to an application. This paper evaluates the efficiency of the encryption techniques AES, DES, 3DES, Blowfish, RC4 and RSA on the basis of image data security and performance in the cloud environment. The algorithms have been subjected to different analytic tests such as differential cryptanalysis, statistical analysis, key sensitivity analysis, and performance analysis to analyses the efficiency of each algorithm for security and performance.
引用
收藏
页码:6053 / 6064
页数:12
相关论文
共 50 条
  • [21] Cryptographic Cloud Computing Environment as a More Trusted Communication Environment
    Jasim, Omer K.
    Abbas, Safia
    El-Horbaty, El-Sayed M.
    Salem, Abdel-Badeeh M.
    INTERNATIONAL JOURNAL OF GRID AND HIGH PERFORMANCE COMPUTING, 2014, 6 (02) : 38 - 51
  • [22] CoProtect: Collaborative Management of Cryptographic Keys for Data Security in Cloud Systems
    Bracciale, Lorenzo
    Loreti, Pierpaolo
    Raso, Emanuele
    Naldi, Maurizio
    Bianchi, Giuseppe
    ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 361 - 368
  • [23] Data Security on Cloud by Cryptographic Methods Using Machine Learning Techniques
    Gadde, Swetha
    Amutharaj, J.
    Usha, S.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (05): : 342 - 347
  • [24] Data Security Issues in Cloud Environment and Solutions
    Dinadayalan, P.
    Jegadeeswari, S.
    Gnanambigai, D.
    2014 WORLD CONGRESS ON COMPUTING AND COMMUNICATION TECHNOLOGIES (WCCCT 2014), 2014, : 88 - +
  • [25] Big Data Services Security and Security Challenges in Cloud Environment
    Alsufyani, Raed
    Jama, Khursand
    Yao, Yulin
    Ramachandran, Muthu
    Chang, Victor
    IOTBD: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS AND BIG DATA, 2016, : 461 - 468
  • [26] Energy Efficiency Analysis of Post-Quantum Cryptographic Algorithms
    Roma, Crystal Andrea
    Tai, Chi-En Amy
    Hasan, M. Anwar
    IEEE ACCESS, 2021, 9 : 71295 - 71317
  • [27] A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing
    Kiraz, Mehmet Sabir
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2016, 7 (05) : 731 - 760
  • [28] A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing
    Mehmet Sabır Kiraz
    Journal of Ambient Intelligence and Humanized Computing, 2016, 7 : 731 - 760
  • [29] A Novel Effective Lightweight Homomorphic Cryptographic Algorithm for data security in cloud computing
    Thabit F.
    Can O.
    Alhomdy S.
    Al-Gaphari G.H.
    Jagtap S.
    International Journal of Intelligent Networks, 2022, 3 : 16 - 30
  • [30] Assessing the Security of the Cloud Environment
    Al Awadhi, Eman
    Salah, Khaled
    Martin, Thomas
    2013 7TH IEEE GCC CONFERENCE AND EXHIBITION (GCC), 2013, : 251 - 256